Difference between revisions of "Vice keys"
(key does not appear to change on CS2) |
|||
(2 intermediate revisions by 2 users not shown) | |||
Line 4: | Line 4: | ||
{| | {| | ||
− | !width=" | + | !width="340"| Game |
!width="100"| Key | !width="100"| Key | ||
|- | |- | ||
Line 10: | Line 10: | ||
| fUk0fF69 | | fUk0fF69 | ||
|- | |- | ||
− | | Counter-Strike: Source / Global Offensive | + | | Counter-Strike: Source / Global Offensive / 2 |
| d7NSuLq2 | | d7NSuLq2 | ||
|- | |- | ||
Line 42: | Line 42: | ||
|- | |- | ||
| No More Room In Hell | | No More Room In Hell | ||
− | | | + | | lREeeapA |
|- | |- | ||
| Nuclear Dawn | | Nuclear Dawn | ||
Line 55: | Line 55: | ||
| ZPS | | ZPS | ||
| 5R0ni0pZ | | 5R0ni0pZ | ||
+ | |- | ||
+ | | Tactical Intervention | ||
+ | | 71B4Dt1Z | ||
|} | |} |
Latest revision as of 17:08, 25 March 2023
VICE keys are used to encrypt the game's weapon config files in an effort to make them more difficult to tamper with. It's not really a great protection, as usually the key is just hardcoded into the server binaries. Some games, such as Golden Eye Source, try to make it more difficult to retrieve these, but even then it's trivial.
These keys can be used to decrypt the CTX files that many games provide.
Game | Key | |
---|---|---|
Contagion | fUk0fF69 | |
Counter-Strike: Source / Global Offensive / 2 | d7NSuLq2 | |
CSPromod | H1aRQ0n1 | |
Day of Defeat: Source | Wl0u5B3F | |
Dystopia (1.2?) | pH3apO8w | |
Dystopia 1.3 RC2 | G8stUh3F | |
Golden Eye Source | Gr3naDes | |
Half-Life 2: Capture the Flag 2.1 | R1dj3axP | |
Half-Life 2: Deathmatch | x9Ke0BY7 | |
Insurgency | DrA5e3EB | |
Left 4 Dead 2 (VScript .nuc) | SDhfi878 | |
No More Room In Hell | lREeeapA | |
Nuclear Dawn | TA+*veh9 | |
TF2 (items.ctx) | A5fSXbf7 | |
TF2 (everything else) | E2NcUkG2 | |
ZPS | 5R0ni0pZ | |
Tactical Intervention | 71B4Dt1Z |